TGM: A generative mechanism for publishing trajectories with differential privacy

S Ghane, L Kulik… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
We describe a new generative algorithm called trajectory generative mechanism (TGM) for
publishing trajectory datasets with ε-differential privacy guarantee, which achieves …

Novel trajectory data publishing method under differential privacy

X Zhao, Y Dong, D Pi - Expert Systems with Applications, 2019 - Elsevier
The existing location-based services have collected a large amount of user trajectory data,
and if these data are directly released without any processing, the user's personal privacy …

[HTML][HTML] Road congestion detection based on trajectory stay-place clustering

Q Yu, Y Luo, C Chen, X Zheng - ISPRS international journal of geo …, 2019 - mdpi.com
The results of road congestion detection can be used for the rational planning of travel
routes and as guidance for traffic management. The trajectory data of moving objects can …

RcDT: Privacy preservation based on R-constrained dummy trajectory in mobile social networks

J Zhang, X Wang, Y Yuan, L Ni - IEEE Access, 2019 - ieeexplore.ieee.org
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile
social network (MSN) applications, which bring convenience to our daily life and …

Dummy-based trajectory privacy protection against exposure location attacks

X Liu, J Chen, X Xia, C Zong, R Zhu, J Li - International Conference on …, 2019 - Springer
With the development of positioning technology and location-aware devices, moving objects'
location and trajectory information have been collected and published, resulting in serious …

Accountable outsourcing location-based services with privacy preservation

Z Liu, L Wu, J Ke, W Qu, W Wang, H Wang - IEEE Access, 2019 - ieeexplore.ieee.org
With the enhancement of the positioning function of mobile devices and the upgrade of
communication networks, location-based service (LBS) has become an important …

“When and Where Do You Want to Hide?”–Recommendation of Location Privacy Preferences with Local Differential Privacy

M Asada, M Yoshikawa, Y Cao - … Security and Privacy XXXIII: 33rd Annual …, 2019 - Springer
In recent years, it has become easy to obtain location information quite precisely. However,
the acquisition of such information has risks such as individual identification and leakage of …

LRM: A Location Recombination Mechanism for Achieving Trajectory -Anonymity Privacy Protection

Y Wang, M Li, S Luo, Y Xin, H Zhu, Y Chen… - IEEE …, 2019 - ieeexplore.ieee.org
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However,
the existing techniques for generating fake trajectories can be easily broken by an adversary …

T-SR: A location privacy protection algorithm based on POI query

L Kuang, S He, Y Fan, H Zhang, R Shi - IEEE Access, 2019 - ieeexplore.ieee.org
With the popularity of location-based services in the field of mobile network applications,
users enjoy the convenience on one side, they may face the risk of privacy disclosure on the …

Interchange-based privacy protection for publishing trajectories

S Wang, C Chen, G Zhang, Y Xin - IEEE Access, 2019 - ieeexplore.ieee.org
Information extracted from trajectory data is very useful in many practical application
scenarios. Before trajectories for data mining are published, they need to be processed to …